2010
DOI: 10.17487/rfc5758
|View full text |Cite
|
Sign up to set email alerts
|

Internet X.509 Public Key Infrastructure: Additional Algorithms and Identifiers for DSA and ECDSA

Abstract: This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc5758.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0
1

Year Published

2010
2010
2018
2018

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(14 citation statements)
references
References 4 publications
(5 reference statements)
0
13
0
1
Order By: Relevance
“…First, consider the signatureValue field in the Certificate ADT. Despite the X.509 standard is typing this field as a primitive BIT STRING, some standardized signature algorithms require it to be a constructed field (e.g., the DSA and ECDSA cryptographic primitives [38,10]), in turn giving way to an ambiguity in its interpretation. The same kind of issue arises in SubjectPublicKeyInfo field in TBSCertificate ADT.…”
Section: Context-sensitivenessmentioning
confidence: 99%
See 1 more Smart Citation
“…First, consider the signatureValue field in the Certificate ADT. Despite the X.509 standard is typing this field as a primitive BIT STRING, some standardized signature algorithms require it to be a constructed field (e.g., the DSA and ECDSA cryptographic primitives [38,10]), in turn giving way to an ambiguity in its interpretation. The same kind of issue arises in SubjectPublicKeyInfo field in TBSCertificate ADT.…”
Section: Context-sensitivenessmentioning
confidence: 99%
“…Concerning the issue of the extnValue field, we choose to eliminate the ambiguity relying on the fact that the standards define the contents of the constructed type binding it to a specific OID: this in turn allows to parse unambiguously an ADT instance. Concerning the BIT STRING fields, we eliminate the parsing ambiguity recognizing them as constructed or primitive types according to the individual cryptographic primitive needs as specified in the standards [37,19,26,10,38]. Such an approach will indeed pick only a single way of interpreting the data contained in the field, preventing security critical parsing issues such as the ones in [2].…”
Section: Coping With Undecidability Context Sensitiveness and Ambiguitymentioning
confidence: 99%
“…It builds on the Cryptographic Message Syntax [24][25][26] from PKCS #7 and presumes authenticated distribution of public keys through a X.509 hierarchical PKI. Supported signature algorithms include RSA (PKCS #1 v1.5 [5] and RSA-PSS [42]), DSA and ECDSA (based on SHA-1 or SHA-2, see [5,15]), and a form of the GOST signature scheme [31].…”
Section: S/mimementioning
confidence: 99%
“…For that purpose, we make use of ECC-based certificates [20] that have been standardized by IETE as PKIX-X.509, which is almost similar to X.509 with a main difference of using the elliptic curve digital signature algorithm (ECDSA) [21]. Figure 6 illustrates the format of the ECC-based X.509 certificate, such that we replace the public key of the user (the subject) by the corresponding attributes for the access control policy, which consist mainly of the role and the permission associated.…”
Section: Dynamic Role Assignment Using Ecc-attribute Certificatementioning
confidence: 99%